Wednesday, February 28, 2018

IT Infrastructure Deployment Process


           IT infrastructure deployment typically the involves defining a sequence of operations and steps, often referred to as the a deployment plan, that must be the carried to the deliver changes into the a target system environment. The deployment, in the context of network administration, refers to the process of setting up a new computer or system to the point where it ready for productive work in a live environment. The individual operations with in the  a deployment plan can be the executed manually or an automatically. Then deployment plans are the usually well defined and the approved prior to the deployment date. In situations where there is a high potential risk of the failure in the target system environment, the  deployment plans may rehearsed to the ensure there are no issues during actual deployment. Then structured repeatable deployments are also the prime candidates for automation which drives quality and efficiency.

                  The data center infrastructure often includes the power, cooling and building elements necessary to the a support data center hardware. Then data center hardware infrastructure usually involves servers, storage subsystems, networking devices, like switches, routers and physical cabling, and dedicated network appliances, such as network firewalls.  Data center infrastructure also requires careful consideration of IT infrastructure security. This is can be include physical security for the building, such as the electronic key entry, constant video and human surveillance of the premises, carefully controlled access to the server and storage spaces, and so on. This is ensures only the a authorized personnel can access the data center hardware infrastructure and reduces the potential for the  malicious damage and data theft. To the create a traditional data center infrastructure, organizations typically follow a formalized process that starts by the analyzing and accessing business goals, making architectural and design decisions, building and implementing the design, and then optimizing and maintaining the infrastructure. The process usually involves detailed expertise, including data center building design, subsystem and component selection, and quality construction techniques.

           Then successful deployment and use of products depend on a well-planned identity management infrastructure. This section outlines the deployment planning process for the identity management infrastructure, there are; The  requirement analysis and high-level deployment considerations are presented along with some logical deployment plans that highlight these considerations. Detailed deployment planning considerations are presented.

              For the deployment to each target computer to succeed, verify that the target name is suitable to resolve to the address of the target as seen on the deployment manager computer. For example, deployment cannot proceed consistently in some network configurations if the list of targets in a directory is not fully qualified with network domain names. And CA Server Automationverifies whether the IDPrimer is installed on the target computer. If it is not installed, the application installs IDPrimer on the target computer first. The IDManager tries to deliver the IDPrimer installation package. The delivery method depends on the target operating environment and the security that is enabled on it. After the IDPrimer image is copied to the target computer, the application starts the IDPrimer installation. If a specific operating system cannot start the IDPrimer installation remotely, complete the installation manually.

               The IDPrimer installer installs itself and the CA Messaging (CAM) component on the target computer. After the IDPrimer is installed and IDManager receive the "installation complete" signal from the target computer, you can start package deployment. An IDManager that previously installed an IDPrimer and authenticated with it can deploy packages without resubmitting user names and passwords. On subsequent deployments, IDPrimer uses asymmetric cryptographic keys to authenticate and limit access to managers that already have access. This section describes some of the typical enterprise requirements you must analyze when planning an identity management infrastructure deployment. The requirements include process issues, functionality requirements, and high availability concerns. It also describes various logical deployment plans that can help you select the optimal logical architecture of the identity management infrastructure. Some of the main requirements that drive the logical deployment decision are enterprise integration, administrative controls, and application deployment requirements. For more

No comments:

Post a Comment